Linux

Linux Kernel

13303 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 04.07.2025 13:37:12
  • Zuletzt bearbeitet 19.11.2025 20:55:27

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix double invocation of bnxt_ulp_stop()/bnxt_ulp_start() Before the commit under the Fixes tag below, bnxt_ulp_stop() and bnxt_ulp_start() were always invoked in pairs. ...

  • EPSS 0.03%
  • Veröffentlicht 04.07.2025 13:37:11
  • Zuletzt bearbeitet 18.12.2025 16:53:01

In the Linux kernel, the following vulnerability has been resolved: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer The reproduction steps: 1. create a tun interface 2. enable l2 bearer 3. TIPC_NL_UDP_GET_REMOTEIP with media na...

  • EPSS 0.03%
  • Veröffentlicht 04.07.2025 13:37:11
  • Zuletzt bearbeitet 18.12.2025 16:53:27

In the Linux kernel, the following vulnerability has been resolved: atm: atmtcp: Free invalid length skb in atmtcp_c_send(). syzbot reported the splat below. [0] vcc_sendmsg() copies data passed from userspace to skb and passes it to vcc->dev->ops...

  • EPSS 0.02%
  • Veröffentlicht 04.07.2025 13:37:10
  • Zuletzt bearbeitet 18.12.2025 16:49:42

In the Linux kernel, the following vulnerability has been resolved: net: lan743x: fix potential out-of-bounds write in lan743x_ptp_io_event_clock_get() Before calling lan743x_ptp_io_event_clock_get(), the 'channel' value is checked against the maxi...

  • EPSS 0.02%
  • Veröffentlicht 04.07.2025 13:37:09
  • Zuletzt bearbeitet 19.11.2025 21:00:39

In the Linux kernel, the following vulnerability has been resolved: ublk: santizize the arguments from userspace when adding a device Sanity check the values for queue depth and number of queues we get from userspace when adding a device.

  • EPSS 0.02%
  • Veröffentlicht 04.07.2025 13:37:08
  • Zuletzt bearbeitet 18.12.2025 15:36:58

In the Linux kernel, the following vulnerability has been resolved: net: atm: fix /proc/net/atm/lec handling /proc/net/atm/lec must ensure safety against dev_lec[] changes. It appears it had dev_put() calls without prior dev_hold(), leading to imb...

  • EPSS 0.03%
  • Veröffentlicht 04.07.2025 13:37:08
  • Zuletzt bearbeitet 18.12.2025 16:49:32

In the Linux kernel, the following vulnerability has been resolved: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). syzkaller reported a null-ptr-deref in sock_omalloc() while allocating a CALIPSO option. [0] The NULL is of struct soc...

  • EPSS 0.01%
  • Veröffentlicht 04.07.2025 13:37:07
  • Zuletzt bearbeitet 19.11.2025 21:01:36

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix max_sge overflow in smb_extract_folioq_to_rdma() This fixes the following problem: [ 749.901015] [ T8673] run fstests cifs/001 at 2025-06-17 09:40:30 [ 750.34...

  • EPSS 0.02%
  • Veröffentlicht 04.07.2025 13:37:06
  • Zuletzt bearbeitet 28.07.2025 05:15:44

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.03%
  • Veröffentlicht 04.07.2025 12:47:09
  • Zuletzt bearbeitet 18.12.2025 16:48:54

In the Linux kernel, the following vulnerability has been resolved: sch_hfsc: make hfsc_qlen_notify() idempotent hfsc_qlen_notify() is not idempotent either and not friendly to its callers, like fq_codel_dequeue(). Let's make it idempotent to ease ...